|
|
|
|
LEADER |
00000cam a2200000Mi 4500 |
001 |
OR_on1300705282 |
003 |
OCoLC |
005 |
20231017213018.0 |
006 |
m o d |
007 |
cr ||||||||||| |
008 |
190122s2018 fluab ob 001 0 eng d |
040 |
|
|
|a DST
|b eng
|e rda
|c DST
|d UKAHL
|d OCLCO
|d OCLCF
|d OCLCQ
|d ORMDA
|d OCLCO
|
019 |
|
|
|a 1240717735
|
020 |
|
|
|a 1315170663
|
020 |
|
|
|a 9781315170664
|
020 |
|
|
|a 1351692534
|
020 |
|
|
|a 9781351692533
|
020 |
|
|
|a 1351692542
|
020 |
|
|
|a 9781351692540
|
035 |
|
|
|a (OCoLC)1300705282
|z (OCoLC)1240717735
|
037 |
|
|
|a 9781351692533
|b O'Reilly Media
|
050 |
|
4 |
|a TK5102.94
|b .K556 2019
|
072 |
|
7 |
|a COM
|x 083000
|2 bisacsh
|
072 |
|
7 |
|a MAT
|x 025000
|2 bisacsh
|
072 |
|
7 |
|a MAT
|x 036000
|2 bisacsh
|
072 |
|
7 |
|a PBD
|2 bicscc
|
082 |
0 |
4 |
|a 005.8/24
|2 23
|
049 |
|
|
|a UAMI
|
100 |
1 |
|
|a Klima, Richard,
|e author.
|
245 |
1 |
0 |
|a Cryptology :
|b Classical and Modern /
|c by Richard Klima, Richard E. Klima, Neil Sigmon and Neil P. Sigmon.
|
250 |
|
|
|a Second edition.
|
264 |
|
1 |
|a Boca Raton, FL :
|b Chapman and Hall/CRC,
|c 2018.
|
300 |
|
|
|a 1 online resource (497 pages).
|
336 |
|
|
|a text
|b txt
|2 rdacontent
|
337 |
|
|
|a computer
|b c
|2 rdamedia
|
338 |
|
|
|a online resource
|b cr
|2 rdacarrier
|
490 |
1 |
|
|a Chapman & Hall/CRC Cryptography and Network Security Series
|
504 |
|
|
|a Includes bibliographical references and index.
|
588 |
|
|
|a Description based on print version record.
|
520 |
3 |
|
|a Cryptology: Classical and Modern, Second Edition proficiently introduces readers to the fascinating field of cryptology. The book covers classical methods including substitution, transposition, Playfair, ADFGVX, Alberti, Vigene re, and Hill ciphers. It also includes coverage of the Enigma machine, Turing bombe, and Navajo code. Additionally, the book presents modern methods like RSA, ElGamal, and stream ciphers, as well as the Diffie-Hellman key exchange and Advanced Encryption Standard. When possible, the book details methods for breaking both classical and modern methods. The new edition expands upon the material from the first edition which was oriented for students in non-technical fields. At the same time, the second edition supplements this material with new content that serves students in more technical fields as well. Thus, the second edition can be fully utilized by both technical and non-technical students at all levels of study. The authors include a wealth of material for a one-semester cryptology course, and research exercises that can be used for supplemental projects. Hints and answers to selected exercises are found at the end of the book.
|
505 |
0 |
0 |
|t 1. Introduction to Cryptology -- Basic Terminology -- Cryptology in Practive -- Why Study Cryptology? -- 2. Substitution Ciphers -- Keyword Substitution Ciphers -- Cryptanalysis of Substitution Cipher -- Playrair Ciphers -- The Navajo Code -- 3. Transposition Ciphers -- Columnar Transposition Ciphers -- Cryptanalysis of Transposition Ciphers -- ADFGX and ADFGVX Ciphers -- 4. The Enigma Machine -- The Enigma Cipher Machine -- Combinatorics -- Security of the Enigma Machine -- 5. The Turing Bombe -- Cribs and Menus -- Loops and Logical Inconsistencies -- Searching for the Correct Configuration -- The Diagonal Board -- The Checking Machine -- Turnovers -- Clonking -- Final Observations -- 6. Shift and Affine Ciphers -- Modular Arithmetic -- Shift Ciphers -- Cryptanalysis of Shift Ciphers -- Affine Ciphers -- Cryptanalysis of Affine Ciphers -- 7. Alberti and Vigenere Ciphers -- Alberti Ciphers -- Vigenere Ciphers -- Probability -- The Friedman Test -- The Kasiski Test -- Cryptanalyis of Vigenere Keyword Ciphers -- 8. Hill Ciphers -- Matrices -- Hill Ciphers -- Cryptanalyis of Hill Ciphers -- 9. RSA Ciphers -- Introduction to Public-Key Ciphers -- Introduction to RSA Ciphers -- The Euclidean Algorithm -- Modular Exponentiation -- ASCII -- RSA Ciphers -- Cryptanalyis of RSA Ciphers -- Primality Testing -- Integer Factorization -- The RSA Factoring Challenges -- 10. ElGamal Ciphers -- The Diffie-Hellman Key Exchange -- Discrete Logarithms -- ElGamal Ciphers -- Cryptanalyis of ElGamal Ciphers -- 11. The Advanced Encryption Standard -- Representations of Numbers -- Sream Ciphers -- AES Preliminaries -- AES Encryption -- AES Decryption -- AES Security -- 12. Message Authentication -- RSA Signatures -- Hash Functions -- RSA Signatures with Hashing -- The Man-in-the-Middle Attack -- Public-Key Infrastructures -- Bibliography -- Hints and Answers for Selected Exercises -- Index.
|
590 |
|
|
|a O'Reilly
|b O'Reilly Online Learning: Academic/Public Library Edition
|
650 |
|
0 |
|a Cryptography
|x Data processing.
|
650 |
|
0 |
|a Data encryption (Computer science)
|
650 |
|
0 |
|a Cryptography.
|
650 |
|
0 |
|a Ciphers.
|
650 |
|
6 |
|a Cryptographie
|x Informatique.
|
650 |
|
6 |
|a Chiffrement (Informatique)
|
650 |
|
6 |
|a Cryptographie.
|
650 |
|
6 |
|a Chiffres (Cryptographie)
|
650 |
|
7 |
|a ciphers (codes)
|2 aat
|
650 |
|
7 |
|a Ciphers
|2 fast
|
650 |
|
7 |
|a Cryptography
|2 fast
|
650 |
|
7 |
|a Cryptography
|x Data processing
|2 fast
|
650 |
|
7 |
|a Data encryption (Computer science)
|2 fast
|
700 |
1 |
|
|a Klima, Richard E.,
|e author.
|
700 |
1 |
|
|a Sigmon, Neil,
|e author.
|
700 |
1 |
|
|a Sigmon, Neil P.,
|e author.
|
776 |
0 |
8 |
|i Print version:
|z 1138047627
|
830 |
|
0 |
|a Chapman & Hall/CRC cryptography and network security.
|
856 |
4 |
0 |
|u https://learning.oreilly.com/library/view/~/9781351692533/?ar
|z Texto completo (Requiere registro previo con correo institucional)
|
938 |
|
|
|a Askews and Holts Library Services
|b ASKH
|n AH34864819
|
994 |
|
|
|a 92
|b IZTAP
|